Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
160s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17/01/2025, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
install/Patch/Patch_MB_5.x.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
install/Patch/Patch_MB_5.x.exe
-
Size
66.7MB
-
MD5
e3a3662da8c190c7e522f3aced8b97e1
-
SHA1
20ae6afe4f851e79c3cfec8375b0fbd53518032a
-
SHA256
dfe7a2d70f947979258da2ae8636bc084e4905775f2185bc6c2ee21e2a57eb6d
-
SHA512
357ae70d5c2f59bae01519da26b6fb631eb41dbf97e3e95927ed9f67c9423a004785e2e6cf8ab97a40102cc3ece552908456e038a9575550f2762bd6e9b43564
-
SSDEEP
1572864:7Pk/elMidYLdjeXqY+jFvyDg94ZJF/+wRRWSJxd8:78/ehdYLdqXqFvy/AwRR3d8
Malware Config
Signatures
-
Drops file in Drivers directory 19 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET9A0D.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SETCDC2.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\MbamChameleon.sys mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SETCE41.tmp mbamservice.exe File created C:\Windows\system32\DRIVERS\SETCE41.tmp mbamservice.exe File created C:\Windows\system32\DRIVERS\mbam.sys mbamservice.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\DRIVERS\mbamswissarmy.sys mbamservice.exe File created C:\Windows\system32\DRIVERS\SETCDC2.tmp mbamservice.exe File created C:\Windows\system32\DRIVERS\SETCDC3.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\mwac.sys mbamservice.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File created C:\Windows\system32\DRIVERS\SET9A0D.tmp mbamservice.exe File created C:\Windows\system32\DRIVERS\SET9B47.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\farflt.sys mbamservice.exe File created C:\Windows\system32\DRIVERS\MbamElam.sys mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SET9B47.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SETCDC3.tmp mbamservice.exe File created C:\Windows\system32\drivers\is-LTCVF.tmp rs.tmp -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MBAMChameleon\ImagePath = "\\SystemRoot\\System32\\Drivers\\MbamChameleon.sys" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MBAMSwissArmy\ImagePath = "\\SystemRoot\\System32\\Drivers\\mbamswissarmy.sys" mbamservice.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mbamservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mbamservice.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation _iu14D2N.tmp -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 13 IoCs
pid Process 3024 7z2201.exe 216 7z.exe 4264 7z.exe 4640 rs.exe 3532 rs.tmp 5032 mbamservice.exe 2908 mbamservice.exe 1264 mbamtray.exe 4160 unins000.exe 3828 _iu14D2N.tmp 1200 MBAMWsc.exe 3784 mbamservice.exe 636 mbamwsc.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService rs.tmp Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService\ = "Service" rs.tmp -
Loads dropped DLL 62 IoCs
pid Process 216 7z.exe 4264 7z.exe 3532 rs.tmp 3532 rs.tmp 3532 rs.tmp 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 3828 _iu14D2N.tmp 2596 regsvr32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: mbamservice.exe File opened (read-only) \??\V: mbamservice.exe File opened (read-only) \??\A: mbamservice.exe File opened (read-only) \??\H: mbamservice.exe File opened (read-only) \??\J: mbamservice.exe File opened (read-only) \??\K: mbamservice.exe File opened (read-only) \??\L: mbamservice.exe File opened (read-only) \??\O: mbamservice.exe File opened (read-only) \??\Z: mbamservice.exe File opened (read-only) \??\I: mbamservice.exe File opened (read-only) \??\W: mbamservice.exe File opened (read-only) \??\B: mbamservice.exe File opened (read-only) \??\M: mbamservice.exe File opened (read-only) \??\P: mbamservice.exe File opened (read-only) \??\S: mbamservice.exe File opened (read-only) \??\X: mbamservice.exe File opened (read-only) \??\Y: mbamservice.exe File opened (read-only) \??\E: mbamservice.exe File opened (read-only) \??\G: mbamservice.exe File opened (read-only) \??\N: mbamservice.exe File opened (read-only) \??\Q: mbamservice.exe File opened (read-only) \??\T: mbamservice.exe File opened (read-only) \??\U: mbamservice.exe -
pid Process 2792 powershell.exe 3604 powershell.exe 4636 powershell.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CA4458E7366E94A3C3A9C1FE548B6D21_C2C3D990B393462F0B24251F41DF0EF5 mbamservice.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt mbamservice.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9 mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9 mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CA4458E7366E94A3C3A9C1FE548B6D21_C2C3D990B393462F0B24251F41DF0EF5 mbamservice.exe -
Enumerates processes with tasklist 1 TTPs 64 IoCs
pid Process 1152 Process not Found 4216 Process not Found 4140 Process not Found 4528 Process not Found 4320 tasklist.exe 1608 Process not Found 1960 tasklist.exe 3020 tasklist.exe 3184 tasklist.exe 2580 tasklist.exe 3224 tasklist.exe 4544 tasklist.exe 1812 Process not Found 764 tasklist.exe 4664 tasklist.exe 2152 tasklist.exe 4968 tasklist.exe 752 tasklist.exe 776 Process not Found 1892 tasklist.exe 3056 Process not Found 4696 Process not Found 4848 Process not Found 1952 tasklist.exe 1844 tasklist.exe 2060 tasklist.exe 2568 tasklist.exe 1588 Process not Found 3260 Process not Found 3380 Process not Found 2060 tasklist.exe 1620 tasklist.exe 2116 tasklist.exe 3012 tasklist.exe 740 tasklist.exe 3032 tasklist.exe 2008 tasklist.exe 1300 tasklist.exe 1520 Process not Found 824 Process not Found 4692 Process not Found 4148 tasklist.exe 3160 tasklist.exe 4936 tasklist.exe 60 tasklist.exe 3620 Process not Found 456 tasklist.exe 756 tasklist.exe 1748 Process not Found 3096 Process not Found 4752 tasklist.exe 3468 tasklist.exe 2936 tasklist.exe 1652 tasklist.exe 4820 tasklist.exe 2364 tasklist.exe 1288 tasklist.exe 2312 tasklist.exe 1820 tasklist.exe 2860 tasklist.exe 556 tasklist.exe 2668 tasklist.exe 4948 tasklist.exe 3656 tasklist.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\images\is-R3VPJ.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\qml\is-UHPIG.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-7O3L0.tmp rs.tmp File opened for modification C:\Program Files (x86)\7-Zip\Lang\ky.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\nn.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\styles\is-NBTN5.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\images\is-2M93G.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\Lang\an.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\mng.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\imageformats\is-OB6U1.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-A79JL.tmp rs.tmp File opened for modification C:\Program Files (x86)\7-Zip\Lang\it.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-I781B.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\Lang\fa.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\zh-cn.txt 7z2201.exe File created C:\Program Files (x86)\7-Zip\Lang\fy.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\readme.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-MDU2I.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\MBAMSwissArmy.sys mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\is-QK2RN.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\History.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\eu.txt 7z2201.exe File created C:\Program Files (x86)\7-Zip\Lang\ku-ckb.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mbamchameleon.sys mbamservice.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\fr.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-7F7SC.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\imageformats\is-PUCQ4.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-D4OM3.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\Lang\hy.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\co.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\is-3IG25.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-3I4DO.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mwac.sys mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQml\Models.2\is-HRBF3.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-031T5.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\Lang\es.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\is-7GOA9.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-RITEE.tmp rs.tmp File opened for modification C:\Program Files\Malwarebytes\Anti-Malware\ServiceConfig.json mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-PFA31.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\Lang\ps.txt 7z2201.exe File created C:\Program Files (x86)\7-Zip\Lang\be.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\sr-spl.txt 7z2201.exe File created C:\Program Files (x86)\7-Zip\Lang\tt.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\fa.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\is-1DV30.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\images\is-49C2D.tmp rs.tmp File opened for modification C:\Program Files (x86)\7-Zip\Lang\ar.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\hi.txt 7z2201.exe File opened for modification C:\Program Files (x86)\7-Zip\Lang\lv.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\Qt\labs\settings\is-02P9M.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-EIC84.tmp rs.tmp File created C:\Program Files (x86)\7-Zip\Lang\ar.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\is-78GE7.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-0PRTO.tmp rs.tmp File opened for modification C:\Program Files (x86)\7-Zip\Lang\ku-ckb.txt 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Controls\Styles\Flat\is-H6UH6.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-G6UVO.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-5F5VA.tmp rs.tmp File opened for modification C:\Program Files (x86)\7-Zip\7-zip.dll 7z2201.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\is-P8K6N.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-KLM1I.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-2R9FK.tmp rs.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-NJ3TH.tmp rs.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ELAMBKUP\MbamElam.sys mbamservice.exe File opened for modification C:\Windows\security\logs\scecomp.log mbamservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rs.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbamtray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2201.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mbamservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mbamservice.exe -
Delays execution with timeout.exe 19 IoCs
pid Process 2376 timeout.exe 1976 timeout.exe 4076 timeout.exe 4816 timeout.exe 3728 timeout.exe 5108 timeout.exe 4972 timeout.exe 4812 timeout.exe 2056 timeout.exe 3408 timeout.exe 2252 timeout.exe 4692 timeout.exe 1460 timeout.exe 2820 timeout.exe 1468 timeout.exe 2916 timeout.exe 728 timeout.exe 1292 timeout.exe 1416 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION rs.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbamtray.exe = "11000" rs.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbam.exe = "11000" rs.tmp -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates mbamservice.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\MY mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mbamservice.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mbamservice.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs mbamservice.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mbamservice.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}\1.0\0\win64 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FD6673C7-8E52-46EE-80B8-58F3FB6AA036}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7AEBAD20-B80A-427D-B7D5-D2983291132E}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0D8223D-D594-4147-BAD8-1E2B54ED1990}\ = "IUpdateControllerEvents" mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAB53395-8218-47FF-91B7-144994C0AD83} mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2446F405-83F0-460F-B837-F04540BB330C}\1.0\HELPDIR mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7F95C137-46FC-42FB-A66A-F0482F3C749C}\TypeLib mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{783B187E-360F-419C-B6DA-592892764A01} mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A82129F1-32E1-4D79-A39F-EBFEE53A70BF}\1.0 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D81C2A20-D03D-40D4-A371-A499633A2AD3}\TypeLib\ = "{A82129F1-32E1-4D79-A39F-EBFEE53A70BF}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{562B1FA7-13DE-40A1-8839-AB2C5FA3129C}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FA484BC6-E101-4A87-AAF3-B468B3F2C6BB}\ = "IUpdateControllerV7" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{61DF8ACF-EC61-4D69-A543-20EA450E1A84}\TypeLib\Version = "1.0" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F415899A-1576-4C8B-BC9F-4854781F8A20} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9CFA1689-38D3-4AE9-B1E8-B039EB7AD988}\TypeLib\ = "{F5BCAC7E-75E7-4971-B3F3-B197A510F495}" mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3BD2053F-99D1-4C2B-8B45-635183A8F0BF}\ProxyStubClsid32 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0D8223D-D594-4147-BAD8-1E2B54ED1990} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{376BE474-56D4-4177-BB4E-5610156F36C8}\VersionIndependentProgID\ = "MB.UpdateController" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{620A01DD-16D2-4A83-B02C-E29BE38B3029}\TypeLib mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CCEFCD43-B934-4168-AE51-6FE07D3D0624}\ProxyStubClsid32 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DE35F2CA-6335-49BA-8E86-F6E246CFCEA6} mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78E69E6F-EC12-4B84-8431-1D68572C7A61} mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4EA13DC-F9D2-4DB9-A19F-2B462FFC81F3}\TypeLib mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ADCD8BEB-8924-4876-AE14-2438FF14FA17}\ProxyStubClsid32 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F36AD0D0-B5F0-4C69-AF08-603D177FEF0E}\TypeLib mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7DAEEB9-30B6-4AC4-BB74-7763C950D8EC}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F128CCB-D86F-4998-803A-7CD58474FE2C} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D4AC5360-A581-42A7-8DD6-D63A5C3AA7F1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6357A98F-CE03-4C67-9410-00907FB21BC7}\TypeLib mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79CAE9D0-99AA-4FEB-B6B1-1AC1A2D8F874} mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{580243BF-3CEE-4131-A599-C6FED66BEB1B}\Version mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{17BE78EE-B40A-4B9E-835F-38EC62F9D479}\LocalServer32\ServerExecutable = "C:\\Program Files\\Malwarebytes\\Anti-Malware\\mbamservice.exe" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BFC6C7E6-8475-4F9B-AC56-AD22BECF91C4}\TypeLib\ = "{783B187E-360F-419C-B6DA-592892764A01}" mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{783B187E-360F-419C-B6DA-592892764A01}\1.0 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7EF16D72-5906-4045-86BC-16826F6212FE}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{61964EBA-D9C0-4834-B01C-A6133F432BB1}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C85F3EB8-B099-4598-89C3-E33BAC2CE53D}\ = "IScanControllerEventsV2" mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{36A65E46-6CC1-4CA2-B51E-F4DD8C993DDC}\VersionIndependentProgID mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{993A5C11-A9B8-41E9-9088-C5182B1F279A}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{130CD414-6BFD-4F6C-9362-A2264B222E76}\LocalServer32\ServerExecutable = "C:\\Program Files\\Malwarebytes\\Anti-Malware\\mbamservice.exe" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{46AEAC9A-C091-4B63-926C-37CFBD9D244F} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9669A3D-81E8-46F6-A51E-815A0863D612}\TypeLib\Version = "1.0" mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5091804-600E-4226-BF28-80ABFDF4AFAB}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3BD2053F-99D1-4C2B-8B45-635183A8F0BF}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A10434E2-CAA7-48C4-9770-E9F215C51ECC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{566DC5CA-A3C4-4959-AB92-37606E12AAFF}\TypeLib mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{783B187E-360F-419C-B6DA-592892764A01}\1.0\FLAGS mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4F3822FA-CCD5-4934-AB6D-3382B2F91DB9}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DA9E74-558F-4085-AE41-6A82ED12D02C}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DA9E74-558F-4085-AE41-6A82ED12D02C}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2E404A3-4E3F-4094-AE06-5E38D39B79AE}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79CAE9D0-99AA-4FEB-B6B1-1AC1A2D8F874}\ = "IUpdateControllerV5" mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66328184-6592-46BE-B950-4FDA4417DF2E}\ProxyStubClsid32 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31BF2366-C6DB-49F1-96A5-8026B9DF4152}\TypeLib mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3F656FD9-2597-4587-8F05-781C11710867}\ = "_IScannerEventsV2" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A9108FB-A377-47EC-96E3-3CB8B1FB7272}\TypeLib\ = "{226C1698-A075-4315-BB5D-9C164A96ACE7}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{17BE78EE-B40A-4B9E-835F-38EC62F9D479}\TypeLib mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MB.RTPController\CurVer mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3F656FD9-2597-4587-8F05-781C11710867}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MB.ArwController.1\CLSID mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1C5B86F3-CEB8-44E3-9B83-6F6AF035E872}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A0EB1521-C843-47D5-88D2-5449A2F5F40B} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9669A3D-81E8-46F6-A51E-815A0863D612}\TypeLib\ = "{2446F405-83F0-460F-B837-F04540BB330C}" mbamservice.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mbamtray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\SPC\CTLs mbamservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 mbamtray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A mbamservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\SPC\CRLs mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a80300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec5290f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae474140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df020000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mbamtray.exe Key created \REGISTRY\MACHINE\Software\Microsoft\SystemCertificates\SPC mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\SPC\Certificates mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 mbamservice.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1264 mbamtray.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2792 powershell.exe 2792 powershell.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 1264 mbamtray.exe 1264 mbamtray.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 2908 mbamservice.exe 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 2908 mbamservice.exe 2908 mbamservice.exe 4612 WMIC.exe 4612 WMIC.exe 4612 WMIC.exe 4612 WMIC.exe -
Suspicious behavior: LoadsDriver 9 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 216 7z.exe Token: 35 216 7z.exe Token: SeSecurityPrivilege 216 7z.exe Token: SeSecurityPrivilege 216 7z.exe Token: SeRestorePrivilege 4264 7z.exe Token: 35 4264 7z.exe Token: SeSecurityPrivilege 4264 7z.exe Token: SeSecurityPrivilege 4264 7z.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 3604 powershell.exe Token: 33 5032 mbamservice.exe Token: SeIncBasePriorityPrivilege 5032 mbamservice.exe Token: 33 2908 mbamservice.exe Token: SeIncBasePriorityPrivilege 2908 mbamservice.exe Token: SeRestorePrivilege 2908 mbamservice.exe Token: SeTakeOwnershipPrivilege 2908 mbamservice.exe Token: SeRestorePrivilege 2908 mbamservice.exe Token: SeBackupPrivilege 2908 mbamservice.exe Token: SeRestorePrivilege 2908 mbamservice.exe Token: SeTakeOwnershipPrivilege 2908 mbamservice.exe Token: SeRestorePrivilege 2908 mbamservice.exe Token: SeBackupPrivilege 2908 mbamservice.exe Token: SeRestorePrivilege 2908 mbamservice.exe Token: SeBackupPrivilege 2908 mbamservice.exe Token: SeAssignPrimaryTokenPrivilege 2908 mbamservice.exe Token: SeIncreaseQuotaPrivilege 2908 mbamservice.exe Token: SeSecurityPrivilege 2908 mbamservice.exe Token: SeTakeOwnershipPrivilege 2908 mbamservice.exe Token: SeLoadDriverPrivilege 2908 mbamservice.exe Token: SeSystemtimePrivilege 2908 mbamservice.exe Token: SeBackupPrivilege 2908 mbamservice.exe Token: SeRestorePrivilege 2908 mbamservice.exe Token: SeShutdownPrivilege 2908 mbamservice.exe Token: SeSystemEnvironmentPrivilege 2908 mbamservice.exe Token: SeUndockPrivilege 2908 mbamservice.exe Token: SeManageVolumePrivilege 2908 mbamservice.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeSecurityPrivilege 2908 mbamservice.exe Token: SeSecurityPrivilege 2908 mbamservice.exe Token: 33 3784 mbamservice.exe Token: SeIncBasePriorityPrivilege 3784 mbamservice.exe Token: SeIncreaseQuotaPrivilege 4612 WMIC.exe Token: SeSecurityPrivilege 4612 WMIC.exe Token: SeTakeOwnershipPrivilege 4612 WMIC.exe Token: SeLoadDriverPrivilege 4612 WMIC.exe Token: SeSystemProfilePrivilege 4612 WMIC.exe Token: SeSystemtimePrivilege 4612 WMIC.exe Token: SeProfSingleProcessPrivilege 4612 WMIC.exe Token: SeIncBasePriorityPrivilege 4612 WMIC.exe Token: SeCreatePagefilePrivilege 4612 WMIC.exe Token: SeBackupPrivilege 4612 WMIC.exe Token: SeRestorePrivilege 4612 WMIC.exe Token: SeShutdownPrivilege 4612 WMIC.exe Token: SeDebugPrivilege 4612 WMIC.exe Token: SeSystemEnvironmentPrivilege 4612 WMIC.exe Token: SeRemoteShutdownPrivilege 4612 WMIC.exe Token: SeUndockPrivilege 4612 WMIC.exe Token: SeManageVolumePrivilege 4612 WMIC.exe Token: 33 4612 WMIC.exe Token: 34 4612 WMIC.exe Token: 35 4612 WMIC.exe Token: 36 4612 WMIC.exe Token: SeIncreaseQuotaPrivilege 4612 WMIC.exe Token: SeSecurityPrivilege 4612 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3532 rs.tmp 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 3828 _iu14D2N.tmp -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe 1264 mbamtray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2008 3440 Patch_MB_5.x.exe 82 PID 3440 wrote to memory of 2008 3440 Patch_MB_5.x.exe 82 PID 2008 wrote to memory of 3024 2008 cmd.exe 84 PID 2008 wrote to memory of 3024 2008 cmd.exe 84 PID 2008 wrote to memory of 3024 2008 cmd.exe 84 PID 2008 wrote to memory of 1480 2008 cmd.exe 85 PID 2008 wrote to memory of 1480 2008 cmd.exe 85 PID 2008 wrote to memory of 3700 2008 cmd.exe 86 PID 2008 wrote to memory of 3700 2008 cmd.exe 86 PID 3700 wrote to memory of 1532 3700 cmd.exe 87 PID 3700 wrote to memory of 1532 3700 cmd.exe 87 PID 2008 wrote to memory of 1748 2008 cmd.exe 88 PID 2008 wrote to memory of 1748 2008 cmd.exe 88 PID 1748 wrote to memory of 2916 1748 cmd.exe 89 PID 1748 wrote to memory of 2916 1748 cmd.exe 89 PID 2008 wrote to memory of 968 2008 cmd.exe 90 PID 2008 wrote to memory of 968 2008 cmd.exe 90 PID 2008 wrote to memory of 216 2008 cmd.exe 92 PID 2008 wrote to memory of 216 2008 cmd.exe 92 PID 2008 wrote to memory of 216 2008 cmd.exe 92 PID 968 wrote to memory of 1696 968 cmd.exe 93 PID 968 wrote to memory of 1696 968 cmd.exe 93 PID 2008 wrote to memory of 4264 2008 cmd.exe 94 PID 2008 wrote to memory of 4264 2008 cmd.exe 94 PID 2008 wrote to memory of 4264 2008 cmd.exe 94 PID 968 wrote to memory of 4212 968 cmd.exe 95 PID 968 wrote to memory of 4212 968 cmd.exe 95 PID 968 wrote to memory of 788 968 cmd.exe 96 PID 968 wrote to memory of 788 968 cmd.exe 96 PID 968 wrote to memory of 3016 968 cmd.exe 97 PID 968 wrote to memory of 3016 968 cmd.exe 97 PID 968 wrote to memory of 2408 968 cmd.exe 98 PID 968 wrote to memory of 2408 968 cmd.exe 98 PID 2408 wrote to memory of 3148 2408 cmd.exe 99 PID 2408 wrote to memory of 3148 2408 cmd.exe 99 PID 2408 wrote to memory of 2272 2408 cmd.exe 100 PID 2408 wrote to memory of 2272 2408 cmd.exe 100 PID 968 wrote to memory of 4076 968 cmd.exe 101 PID 968 wrote to memory of 4076 968 cmd.exe 101 PID 2008 wrote to memory of 2792 2008 cmd.exe 102 PID 2008 wrote to memory of 2792 2008 cmd.exe 102 PID 2008 wrote to memory of 3604 2008 cmd.exe 103 PID 2008 wrote to memory of 3604 2008 cmd.exe 103 PID 3604 wrote to memory of 4640 3604 powershell.exe 104 PID 3604 wrote to memory of 4640 3604 powershell.exe 104 PID 3604 wrote to memory of 4640 3604 powershell.exe 104 PID 4640 wrote to memory of 3532 4640 rs.exe 105 PID 4640 wrote to memory of 3532 4640 rs.exe 105 PID 4640 wrote to memory of 3532 4640 rs.exe 105 PID 968 wrote to memory of 728 968 cmd.exe 108 PID 968 wrote to memory of 728 968 cmd.exe 108 PID 3532 wrote to memory of 1468 3532 rs.tmp 109 PID 3532 wrote to memory of 1468 3532 rs.tmp 109 PID 3532 wrote to memory of 2088 3532 rs.tmp 111 PID 3532 wrote to memory of 2088 3532 rs.tmp 111 PID 3532 wrote to memory of 5032 3532 rs.tmp 113 PID 3532 wrote to memory of 5032 3532 rs.tmp 113 PID 968 wrote to memory of 4692 968 cmd.exe 116 PID 968 wrote to memory of 4692 968 cmd.exe 116 PID 2908 wrote to memory of 1264 2908 mbamservice.exe 117 PID 2908 wrote to memory of 1264 2908 mbamservice.exe 117 PID 2908 wrote to memory of 1264 2908 mbamservice.exe 117 PID 968 wrote to memory of 4816 968 cmd.exe 118 PID 968 wrote to memory of 4816 968 cmd.exe 118 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1480 attrib.exe 3400 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\install\Patch\Patch_MB_5.x.exe"C:\Users\Admin\AppData\Local\Temp\install\Patch\Patch_MB_5.x.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0GDFD3BJ.bat" "C:\Users\Admin\AppData\Local\Temp\install\Patch\Patch_MB_5.x.exe""2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\qbE576C27.C3\7z2201.exe"C:\Users\Admin\AppData\Local\Temp\qbE576C27.C3\7z2201.exe" /S3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts3⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:1480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr "keystone" "C:\Windows\System32\drivers\etc\hosts"3⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\findstr.exefindstr "keystone" "C:\Windows\System32\drivers\etc\hosts"4⤵PID:1532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr "holocron" "C:\Windows\System32\drivers\etc\hosts"3⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\findstr.exefindstr "holocron" "C:\Windows\System32\drivers\etc\hosts"4⤵PID:2916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\pb.cmd"3⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\mode.commode con:cols=86 lines=364⤵PID:1696
-
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:4212
-
-
C:\Windows\system32\mode.commode 70,44⤵PID:788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy/Z "C:\Users\Admin\AppData\Local\Temp\pb.cmd" nul4⤵PID:3016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo prompt $H|cmd4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo prompt $H"5⤵PID:3148
-
-
C:\Windows\system32\cmd.execmd5⤵PID:2272
-
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:4076
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:728
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:4692
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:4816
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:2056
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:3728
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:2252
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:1460
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:1292
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:1416
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:2820
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:5108
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:1468
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:2376
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:2916
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:4972
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:1976
-
-
C:\Windows\system32\timeout.exetimeout.exe 54⤵
- Delays execution with timeout.exe
PID:4812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2108
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3540
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:60
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4704
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1316
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1868
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4628
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1452
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4664
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1748
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4516
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2924
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4824
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2900
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4160
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3892
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3068
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:216
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:456
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2760
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4420
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4928
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2032
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3052
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3096
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1056
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2912
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4156
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2852
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2056
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3020
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1392
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1888
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4652
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2796
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5112
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1680
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2860
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2296
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:756
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4320
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3548
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3836
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3488
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1308
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2792
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3352
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2668
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1240
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4480
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1536
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4948
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1028
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3112
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1596
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1592
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1916
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4884
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4280
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3096
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1056
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2912
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4156
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2852
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2056
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3020
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1392
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1888
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4652
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2796
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5112
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1680
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2860
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2296
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:756
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4944
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4508
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1060
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4788
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4148
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1244
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4692
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2556
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3772
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4624
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2408
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1304
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1960
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4856
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:764
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4072
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4924
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4468
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4584
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4520
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:988
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1752
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3504
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2820
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:844
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1228
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1468
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:520
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5080
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4496
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2396
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4972
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:476
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4640
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4696
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:60
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1624
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1316
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1868
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4628
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1452
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1608
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1308
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2792
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4444
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:400
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4724
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3828
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4600
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1844
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4948
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1028
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3112
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1596
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1592
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3440
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4884
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4280
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3096
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4492
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2912
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4156
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3188
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3312
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1048
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2916
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2308
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2480
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:824
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5044
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4092
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3680
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4796
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4416
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4452
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4080
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2232
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1352
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1284
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3368
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4656
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3792
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4840
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4636
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2944
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4612
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4680
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:772
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2760
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4420
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2864
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4684
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1916
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2168
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1760
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3608
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:728
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3152
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2248
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4560
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2744
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5080
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4496
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3140
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3768
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3740
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4640
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4696
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:60
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2124
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2584
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4320
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3548
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1452
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1608
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1308
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2792
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:852
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2460
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4716
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3728
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:216
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:456
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:864
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2568
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1952
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4616
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:740
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2712
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:708
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3524
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4976
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:460
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4548
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2828
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4264
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2744
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5080
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4496
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3140
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3768
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3740
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4640
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4696
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:60
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2124
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2584
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4628
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2232
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3724
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3684
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3308
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:404
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3352
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2668
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1240
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2656
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4480
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:928
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1956
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2420
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1288
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3224
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3400
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3044
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1928
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4752
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2936
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4316
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:240
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1756
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2852
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2056
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2200
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3256
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2916
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2308
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2480
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1180
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4744
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1404
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4484
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4528
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2392
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4416
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2236
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3032
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3784
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3580
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1284
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4868
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1244
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1192
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1996
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:464
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3068
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3040
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1844
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2332
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4948
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4536
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3408
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:396
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1924
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4872
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1448
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3144
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2576
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3152
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4960
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4560
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3592
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2376
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1048
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5080
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4496
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3556
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4328
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2480
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1180
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4744
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3276
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2284
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2580
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2392
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4416
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1388
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3032
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:732
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2924
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1476
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1152
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1628
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3480
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1332
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4372
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2280
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2760
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4804
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3112
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1596
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4128
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2664
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1416
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3608
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:728
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1532
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2432
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1228
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4216
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3312
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2484
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2396
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:972
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3260
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3140
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4936
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1988
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4484
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4704
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:60
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2136
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2208
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2728
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3784
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3848
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:472
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3228
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4444
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2024
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2228
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3068
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1376
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1304
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4072
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2508
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4924
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4228
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1196
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3524
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4976
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:460
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2148
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4492
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4316
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2272
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4264
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2744
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:548
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4652
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2796
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5020
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3472
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2548
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5044
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2108
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4528
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4076
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1188
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1908
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1452
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4788
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1748
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4824
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4188
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:400
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3892
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4020
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1620
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3700
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1960
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:2568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2864
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:740
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4584
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4520
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1032
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1416
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3144
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:728
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3152
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4960
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4648
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2852
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2056
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2200
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3776
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2868
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4496
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2796
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5020
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3472
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:3012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2548
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:5044
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2108
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4528
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4076
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4344
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3816
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3488
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2924
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:640
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3792
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4580
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3116
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3952
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4184
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4880
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4856
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4948
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:764
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1952
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2000
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4520
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1032
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1416
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2148
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:5028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4492
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:1892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1756
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1012
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3592
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2376
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3640
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1392
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2788
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1464
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:1264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2796
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3740
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:4812
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:3412
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:3236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2312
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:2296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:1316
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:60
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:556
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵PID:4416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh4⤵PID:2208
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq Malwarebytes.exe" /fo csv /nh5⤵
- Enumerates processes with tasklist
PID:4820
-
-
-
-
C:\Program Files (x86)\7-Zip\7z.exe"C:\Program Files (x86)\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\qbE576C27.C3\ck.7z" -o"C:\ProgramData" -pdgdfgdfDFGfddjfhjdrkhg7tgjfhjdjhgsg -y3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Program Files (x86)\7-Zip\7z.exe"C:\Program Files (x86)\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\qbE576C27.C3\rs.7z" -o"C:\Users\Admin\AppData\Local\Temp" -pgfdgdfgdfgdfgFGDgfkjfhdjgy6dufdg -y3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process -FilePath 'C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe' -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-' -NoNewWindow -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process -FilePath 'C:\Users\Admin\AppData\Local\Temp\rs.exe' -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-' -NoNewWindow -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\rs.exe"C:\Users\Admin\AppData\Local\Temp\rs.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\is-5T71U.tmp\rs.tmp"C:\Users\Admin\AppData\Local\Temp\is-5T71U.tmp\rs.tmp" /SL5="$60228,63820596,239616,C:\Users\Admin\AppData\Local\Temp\rs.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\certutil.exe"certutil.exe" -f -addStore root "C:\Users\Admin\AppData\Local\Temp\is-E875U.tmp\BaltimoreCyberTrustRoot.crt"6⤵PID:1468
-
-
C:\Windows\system32\certutil.exe"certutil.exe" -f -addStore root "C:\Users\Admin\AppData\Local\Temp\is-E875U.tmp\DigiCertEVRoot.crt"6⤵PID:2088
-
-
C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe" /service /Protected6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3408
-
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\ProgramData\tl"3⤵
- Views/modifies file attributes
PID:3400
-
-
C:\Windows\system32\xcopy.exexcopy /C /H /Q /R /Y "C:\ProgramData\Malwarebytes\MBAMService\config\LicenseConfig.json" "C:\ProgramData\tl"3⤵PID:4228
-
-
C:\Windows\system32\xcopy.exexcopy /C /H /Q /R /Y "C:\ProgramData\Malwarebytes\MBAMService\config\ScanConfig.json" "C:\ProgramData\tl"3⤵PID:1032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process -FilePath 'C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe' -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-' -NoNewWindow -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe"C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe" /FIRSTPHASEWND=$E0064 /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3828 -
C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe" /unregserver6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Program Files\Malwarebytes\Anti-Malware\mbamwsc.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamwsc.exe" /uninstall6⤵
- Executes dropped EXE
PID:636
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u /s "C:\Program Files\Malwarebytes\Anti-Malware\mbshlext.dll"6⤵
- Loads dropped DLL
PID:2596
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path win32_LocalTime Get Day,Month,Year /value3⤵PID:408
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_LocalTime Get Day,Month,Year /value4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq SbieSvc.exe" /fo csv /nh3⤵PID:1696
-
C:\Windows\system32\tasklist.exetasklist /fi "imagename eq SbieSvc.exe" /fo csv /nh4⤵PID:4072
-
-
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Alu" /s /reg:323⤵PID:4752
-
-
C:\Windows\system32\reg.exereg Add "HKLM\SOFTWARE\Microsoft\Alu" /f /reg:323⤵PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v "SystemProductName"3⤵PID:4928
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v "SystemProductName"4⤵PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemProductName"3⤵PID:1592
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemProductName"4⤵PID:1924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemManufacturer"3⤵PID:4684
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemManufacturer"4⤵PID:4584
-
-
-
-
C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe" /wac 1 /status off true /updatesubstatus none /scansubstatus recommended /settingssubstatus none2⤵
- Executes dropped EXE
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Safe Mode Boot
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a2cc0a771f7507d28d4ea0131695186a
SHA1e31043104a102b636374bef2a5f92c75ccc36fc1
SHA2562d9b0f8632c6df2ec2aa1e75d839a6d61128a7724b5509f939078f3a52005e92
SHA5128a1ec52dafe9c7c102ec88df8a95245956238246e1be89b46361ff6d4d69358b08c7fad8fc50d83f59ea6e887e543f53b51eca58d816c3b2d348e57b6a2f283d
-
Filesize
4.1MB
MD596bded4523bb423b51a6d8046a10132b
SHA166123f2e3c4b8d8802fdd8d27af86a6f1f5b2841
SHA2560d3aa8451da1894db98f492152005defe1947ea911446dd1112868f219f31244
SHA51245c7fd71b608e8019f6e7a00469f93745b5b731615cfae48518f12d9bd119b9cb53e88fcc97d5de5067f406140a8d7cdb32274eec0c7fde4addd8a1a697d89bc
-
Filesize
2.1MB
MD55c6a18b45eef87554c20b35aebbaf095
SHA133ab693d6c217bcf41459bac12beaf74d2db4110
SHA256750aa87ad53c56300295639f1b1fb9ed70e6450c83c806e951948c7be2a86a99
SHA5127544c8ec1aef1896bdc061c1db3950069a8d18d1e876c2c8ce75f61e6f4d038cffcb594d757cfccd1a67311e4e4b8059146cef0ab6b862d0342910dc34201e5f
-
Filesize
5.4MB
MD51aa36b41e437501f20ba879d9c23ed3c
SHA10f8ec29c321e0c96fb3bd3d8c51945ce70199490
SHA25686f81665b233c7bb75ea5b986edcb486ce92faf38d670d63632eb23875b32b40
SHA5122db53b44c47daabf74229755cfa9621cee8bb397042a8b8dc7e0748b366f42ff866a9e97562e5dea012f3d1741debbd5152debaadefa5060eb9f32a4bc1507f9
-
Filesize
3.4MB
MD5447926609e3228ff943c3cde0ed1692d
SHA1adbe95d3682677fa6583892124574d0f14ef1bc7
SHA256a50580cfb78676285130ca13fa052df96cd6d1bf639be78a9739a2db4fab2944
SHA512a1277c4c5da9f1801308db96365f413866ff250b38a338e8e93565f658bf2d3ea4dcd8f7820194b21eced4778b1694cdece85a51e2380548e5ace8a1a795726f
-
Filesize
3.6MB
MD5907cd3b4605457a0fcc4c884fbb85c80
SHA16aeeca92f5ccf58b86bb1d5b2d0babe0b4e432b1
SHA2562a12a8240f416ed00329b6ea3e2d01bf759d758b59c6e87ed22d1ebe71818a2d
SHA51287251b2ba3f7a2b4e07d9c89026a53707125ce11814131612abf231c6c34239b02e1567eccb8cefededce95cfa70e8501c5c6049f8aa967d7fde917ff13c0791
-
Filesize
2.1MB
MD57821333ce81660424940fee144ae859b
SHA10296ea96ff58b0bd21c8b3f73816e96ab3ccf6bd
SHA256804a146bc91474f9a87accd473802efc74441020beb4cd455ee0b316d0b86d47
SHA51223ce5e8c4aab068183e2ee45353e65ee5aa3a99d05926744c21ea0ac8fd29000523e6d04cec6b7be29245b13a1d6eca4b9cc7e47e9ececd7779cea3fa01936a4
-
Filesize
2.4MB
MD569d87ada8d240550d7469e5ce7c75369
SHA1bb3422b1dc462922b6a24eee46629b89a590d327
SHA256b44957becd817bb9febcfc627627709916c82f366eecac6e71e630e5bffafc79
SHA512bb91fb0540a861155e5b3d28f109b4bb7f6b6f1d3138391bab382d0750c1968672c163c1cdab226fe3a819e36d6307ec2df94e3539918bec5b55c34214437a58
-
Filesize
4.3MB
MD580a36bcaa9d09595687ff51460676127
SHA1a00a6ad5ddcaffcfb74e3394e46960dfd5450a17
SHA25655e3fbf495de13c76b6a715cfb68f2175efd5d9d58776e3b2fa3faec7a1f648e
SHA5122142b166be03cc0c00a1aa39d1263c26deace2453470c3a2753279de594bea111325b2b933fc8a3f4e9b4fa6d101cd0ad44d3371d590440cba7af7e53513da7e
-
Filesize
3.3MB
MD5bba22e78c119bb5ebdb904ecb9558d7d
SHA13a40af6df28969622a7161e118bccb54e1a30544
SHA256e149a3ecc5b44b50fcd5a70b884a7715edc4ac0dae904add3d1cb3c2d93f1f6a
SHA512f4cb0728502cfa1665fa1625791d4f0129ddd0e8a2b6d2179af230d19417c56f0be627611ea36753f50cb56cef2feab6995528dcb82a89560280a824f3dfff0f
-
Filesize
2.2MB
MD5e1e0e1e5342cacb856beaf7f5791ce3c
SHA1bcaa9d08eb2ac153276bd0509c91a84a277a5a54
SHA2567c61bcded4713b4b156139833c0da0d1076a790a54218f6e3c7b51752cd6fa9e
SHA51281ef3efa37a9e76d2153bca2eef33715373556fd9057945410d198182736fd68b724510bd4458aaafab5497d78c696bb7a24f82fe3cddd7b27e24fe804eb550a
-
Filesize
4.0MB
MD555ef5563825fda3ab05cbee48bb5cc99
SHA1fcb57cb21714edfc7e59671e9b3a6d9842a988da
SHA2563417da91c99c3a4f99c268dd94ca61e59a76340102af54ff984cbf8f339e24d5
SHA51273891411be688711ee86b9759eeeb6c66799892f0dc9f668d8233aee95e6b397cf0434463308d6af77c4b592fe5b71dbdd7de031ce3d071657d29dff64c51ad1
-
Filesize
3.5MB
MD5235404716813d5b32d26fd17aed9112b
SHA1c77d3fde646cc07c274cbc2318fd884a6c8a4f36
SHA256ffff47710970e3bcd5e8c2a28867a2e2dc0c01278a531223e535efabea528781
SHA5126aecc1de3cb86d25b66e81badc7b6966d42fcc72925414594e550bb7e71d569835001fac2e5b6ee179307545bc395717c963110ca7c69f0bbd55b9132a11e5eb
-
Filesize
2.3MB
MD5439e2f41cc91de42214d5ca2ea69ecd1
SHA1538bbdb5d0b7e563dbe1b1938e676a64b829b9c0
SHA25694a820e238024dc5c65785b37141020078eed9b170be4389f085577637b538df
SHA5128b9ea8e345150a140e82ac53424bf4aa8c5d05879034b7057e453fa3840a4fb4e09998f43c67090084c72cbcd7499fa145141fbfe56599ef25ce62f84092bd04
-
Filesize
51B
MD5bf86796fe0fb92b34e5f1100d5eb3bb5
SHA1bc10ef8edff446a9aae29a70be7fdb380979f916
SHA2562fc07c3fc5e834495d3f76b3f4b6454c57e78eb928cdd343b863d8170f00ed67
SHA512ef0c5e7ad46e9dd5dbe3741595b5887b34b75eab30de27343b02e68f0430e8a8cc7c79791f3a0ac1871d362eef3bd34f9bd4ac54e77a95ad1d1f2e1c65a10cbe
-
Filesize
47B
MD5f87ee333fc7093fb0a7d0bf86acde081
SHA18e5634b4eaf7ad9201be8fb04fd3ed734d3c5a28
SHA256e5ef72fb7af61be42f9f833f5e532ff4128a26e73920832ca87c5f00164e74a7
SHA5128530fb2efaa8de0c7f2a102a44fd4a035fbe9a06040290820fe0480e8f9bea2295695cce253023b92ad8ac0f2fe9563a6a0cd10e423e1c2e1fa212146276533f
-
Filesize
1.2MB
MD5a65e53c974a4e61728ecb632339a0978
SHA127e6ec4f8e34b40f1e08503245700c182b918ce9
SHA256ca8ab5aeef734f24a3c58bf10b3f0152c2ea1329b02d2730448693df563b4c6a
SHA512b029962f08867496cd3fd5e9af4b0703dae918e938aee759aeffbb4184ea6d3e81e0878ba8957e80d30db5d7b6fc8598e68918a4d16b3d010f31a2e16417593e
-
Filesize
329KB
MD562d2156e3ca8387964f7aa13dd1ccd5b
SHA1a5067e046ed9ea5512c94d1d17c394d6cf89ccca
SHA25659cbfba941d3ac0238219daa11c93969489b40f1e8b38fabdb5805ac3dd72bfa
SHA512006f7c46021f339b6cbf9f0b80cffa74abb8d48e12986266d069738c4e6bdb799bfba4b8ee4565a01e90dbe679a96a2399d795a6ead6eacbb4818a155858bf60
-
Filesize
2.1MB
MD563df04ba26b4e485e7e6d9acd497dfd8
SHA141554bf4069a6e07cd2abe941b7496f5084ba286
SHA25667bbf76887027a8924ceff2d81f119a36283a882c2611c104f137d8375f10acb
SHA5122571a9ba4c4101622360bf3cf548cf97f78cd0a07013bae207e45b964a12d822447dd2a1da1f0208029f46b169afe729231374e87aa830f7910f81e3b12ba826
-
Filesize
256KB
MD509a3995806569a7d3fdb05e54ea815ac
SHA1f6ea0bd03ef8d01fe92a63c750586b86ccdf7253
SHA2569e8a6672431aa5b805091c3e08f89417b7ba9ab931a031f3ff9641efccc6ed3f
SHA5120d76fe4b70225bbb2bcbf6734ae0a238a9b5b93eb53c6ed5feee30674c5dab79deb0b222100cf27bb8a1035832c3be153e900fe6a6703829a133126a57a76144
-
Filesize
6.4MB
MD5327cb21b41ce523e2faba8e17ab24404
SHA16dcf3b4a21433b7f365e16a89a131e17e1de4cef
SHA256638d1e4201f7e8e0f5aae7d880fda02874cbbee98eff48e9e1fd0291451a0ac9
SHA512f445f6020997ebbf513f9a470576a84d4b93823e2e143daa7408e7bac83276cb75f8e37c31046482a1aaf1380d6b27218be5b85b045ad6c3200baa7855e68028
-
Filesize
9KB
MD5988b553a227f7f37f14abb060a320b6f
SHA1f8244956defa0241dca4a6d5e5ee159b5ff96ecf
SHA25642b5c504cfeb02e7d12526ff5398d6063f3e9b3661bc4fb2ce312c7c6213af84
SHA5124c080c853d9a9265ea80fab43cea78ed9230c7be7977f84bea98847792996a9434dc8cfeda96ab2f357eb86134cd81681c6b91215b3f61e89dc96fcdb15e4324
-
Filesize
2KB
MD5c481ad4dd1d91860335787aa61177932
SHA181633414c5bf5832a8584fb0740bc09596b9b66d
SHA256793626d240fd8eefc81b78a57c8dfe12ea247889b6f07918e9fd32a7411aa1c3
SHA512d292e028936412f07264837d4a321ecfa2f5754d4048c8bcf774a0e076e535b361c411301558609d64c71c1ce9b19e6041efa44d201237a7010c553751e1e830
-
Filesize
20KB
MD531e4ac0c3d3bac32082304bd43560760
SHA1ac98325151661fc73674bfde8f40d2322b6f6f86
SHA256228ca2a510bb8bbf0e0ab29455bb0961b82774ff74e664bb20a864758b8b0904
SHA5122cfbf89ffecb1a001b8cd4f61d02681cac5900ea3166825cbe77982cf5cec40dff1cd0e2c17d3fb73842273e083b60683baa94dbf995c65d42300c4741196a64
-
Filesize
607B
MD5d1d2d105889ed4fcefbac2e78248cdcf
SHA19c3088e1b863b7da1ef83126a267bda000d71349
SHA25648582342d1f338ecc90ed8f3a78d1b94606e680bed049f3bbeeae2a93b829c2e
SHA51247756b3b19f01c91e9d4a46e0b0d0d5564d7d63859be06dba47e954862acd1857591bbf57a3fb31dda4af8870742aabb80d83ef795571fadf80b497bc6800e28
-
Filesize
8.4MB
MD50ef8c690deab2e93b2cff1aaa5302065
SHA1469b8673542ae6bdd6467d0a83123704ea6a0306
SHA2560dc6596eeda04c2f82bf232059aaf675d461d6302710a14fbf0b895ae44bac6e
SHA5123244b549381d7e9db957f1c06f2c2b81be0fdaf67e5c706f499d80819e016841e19cc55e252adef29e9b95007f8bd9ddb5bdae868bb98fac31e0ae5da1c87b6d
-
Filesize
2KB
MD50ff3f3ba83e1dc78aa42e205e1a01867
SHA10a557f31af77bfccccd9530227d593efb4809fd2
SHA2569c5dad17bd0878115a88a4c94405fbd9048294462eea474f265ddddedc90771e
SHA51280543530d28722b926d3aeda4a0c61fc5bea1812e38a3a1b7b84a5a1803c078bc54c32eff23b96766fd5e27301818f105d86235cdddbaa0dc51ac347ed3d7dfd
-
Filesize
268KB
MD5303f8c619d472c98754b369e582f8e17
SHA171b32fb7b9faa4747be0c98a41fc88466e981b08
SHA2561d5ec9dd832ea97b5984939605897749c786094460cbd731ac2c44712b65cf0c
SHA51272241900cccbac3c19193f54649ff9bd89537a29df29d859f1358457ec9976c4b2a5ce8362b3438c7ad7feb8fb3c47cee00dbddb6e408259f8d45d7d9f30dda1
-
Filesize
219KB
MD5e271a915b084d17c4b18c26f8eb62ec9
SHA128638ae1c1cc5b04fb0f13d7b91c32847c2ae8bd
SHA2561d498436bb314813551704a3e46570cb3216224d6dae5473598df0cec3c5577b
SHA51266edec305631440f8f8ae3b75eae8c165b5d8c86e7cb3ebb947e6517c6fca45c005f6f7f77adec6f2bd2e7e9c55dfeaedfc2f10c7187a64904062b2d124ed8fd
-
Filesize
195KB
MD5af6d573ff797ace9f62cf693a18ce8af
SHA1c947458393289e420762f005bc8d8a7e8c905f3c
SHA2560c7c976d097788650cdd4440a421fc5f80e6a3ab33445e7e8ac49bd0d999fea0
SHA5125284ce3a008b4d5504dc17c96510aa0df416c08a9b57206982fc2b1b190535c52975827fded4fce7f09160deb8edf7417be665656145b085b4ecae7c503e950c
-
Filesize
113KB
MD5792f29fb1d0efb9410b26601772e2ba6
SHA12cf7b518b3be82a9cc98b9d8d83256ae156c34db
SHA256aed5fd68add4ab2e602c3dbb7956b83f6b04be569ac8910781a07cd4ff1d9a3e
SHA51288e3c9863bbf2d104d893f66568b6c264a6d1131690c1caa22c68cecbcb4837d461144c831f3d9e824a3e882cb2485fbaca9cebca9edc1b319db6d278807c2a2
-
Filesize
53KB
MD57e8245c00eb03caf9d15f6322ef17400
SHA1314c64dd9025687cd66ce6900161cf1ac25aa892
SHA256fd47303ac451951b7fa0c32fde759a84c28ae48f685491113eccbc9e65776268
SHA512b68a6a1fd0ddecc20beeb414444b5a53779220d1683571e5a37c7da3a28403cf9a45921cb6dce0a062ab1c57a6ea12c8905a0308064ee1aeaecf7e73a4bbabc4
-
Filesize
69KB
MD5b59c99ddc36b9fe55d0110271c7b221c
SHA1b5c8c6d9ac8e7248f5a1cd83d9032071b48114b8
SHA2565e7ef365d6488bcb42c6c226a8b27a22495f38695375de4e9f7b1f54bf8d620f
SHA5122746b86a92762b1cf0fff9f9613f1bc43907a7d6ba63bcdc6d0cf0a1e3a8be87d909bde9a4d15170b9192ac22cbf34ff25ba4f7156be58df97df3cf989aa1e69
-
Filesize
41KB
MD5bd2da154e9ae2f5f736d7d8cd2b32851
SHA19f78cd0a54e1a071739cc28852fe2a758ee2cea2
SHA256e80848a3791333cbb4824c6756bc5d7b754e1efba0a74e9f01a6a811767ec7c5
SHA51234eb4ac8f2a80aadb2a75f92fa4f7a595fe67a9e5412fa3c07e21789f3370ea60feabd129a8f8cc1ec02c66300d3588861a47f0e659ad8966b4bb252dbb9c96a
-
Filesize
243B
MD556a75ce818a75f97a63a09f6f0168d0e
SHA170076a87cbea0fe6e363368bda186a452e39f9b3
SHA256832ac7b214608f08d0747a2f45bd2e686563bb9759c2633291c661444c0d626e
SHA512b8397a28ccef6aa8de82425981e11d6bffb19a97dfc2477da002d0ba2b6373d3c9442a2d6541566d8607e0a692f44dc03bf4cdd17944bdec9ac4d5f064c1aeec
-
Filesize
10KB
MD50ddbfffd3630f7663587129b1ebca089
SHA1e87905a953e80f513012caeb76f773d30b1e3f2a
SHA256e2b86f83c53dc5503065cebdd14e3cadb0167fe561a156d472d04244fe5a298b
SHA512bca5a3ad9ead5a6ef84cd7da7251a5183b8d903b6afe550e8d641a26d46090cedf966cf39a058eff660ceecb27ed08d4b35fec1ef574f61436e6e27306753318
-
Filesize
10KB
MD5cf28d6ae10185d1fee87229715b644cf
SHA179b2f93ae08a32a9df9ca09e07f8e709aee41634
SHA256eb27057b1cdd1a185bcea3ef421f7235dc3eb7ea05459c3e9a2c252af88edddf
SHA512fac898de96187b55ccecf3d2f1b0ba7b104baf89fcc59d43b7e92decbf78156971529c47c27b45b6285c5e00127a1d500bdd687e136960ccf137f1aed1f691ce
-
Filesize
1KB
MD5af1f5ed28b3071fd8bd8b7077cd79c8b
SHA1d37565d982020abd82681bc702182db8b2581e38
SHA2563455c605dc9b97d490433b51a3f62eb7f749400749c2e2cf7969d5b714310ef0
SHA512b6f6520fab154042702428148f7764ab4728defd9d40aed4ac8e3d1daa1592721bb840c2ea7c6c9ff9eb6a54526096a03f64c8716f849923ffe7cd327fdf738d
-
Filesize
803B
MD5416329c4d4100259e7b13a5e8f3b3a24
SHA14bea92afc0e45929df68b82208f22948ba6e1179
SHA256a0dbee1f436fae26dee65662c76e44936e200b22662876b008be94811309c78f
SHA512f7b18ccba0f0cc0426475893179a97f8bb92021d91dd7a7c06eb04a77082fd125c8f06f2e9812456bb49bddcf49c92a052ecb9f70ed24d0fa95141c381d8bbea
-
Filesize
645B
MD580c984cdfb8679c16259ff614dd53dfe
SHA17bfe1d28cea499e9258e76cc46c0964ece271f24
SHA256efb855999c7ce5823154c4cdfc83bc5d53c788586c7d4751967ae4326427aff7
SHA512e8e86444d15bc5e52a5322dc56b7a51f639424f33eab1c8018578822d6e7857e5723931fa037a613cefc35b05b0cbe3856713188a97f75fed7b03999da449330
-
Filesize
5KB
MD50c12c01a1152e1ade3aa3f9c155e763b
SHA151b992346778137cf03120d3c91a88ffd33475a1
SHA256ecf3f82c416e8d785b6806dbb6cd3bff17ffe2a3150a59c741dfee81d7cfb9c2
SHA5128c9c67e753de6a98fc91ea8f802ef44d7114cce0677df1a22d1fca3a3fd637e14657e75dc6cf4036c5069cb98f28566469c4f73da9ac4a6ccb238fe77751f412
-
Filesize
3KB
MD59b47c1ae2d346e8de276be35da06acb1
SHA108aa691ed2aec5f3402e0b07fea67c4a87c3aaea
SHA25606c9a217625619a4cd3cf6ea2cd99a8d1cf1ab2a1c2ec37963ae9e7433e57455
SHA51287d525ee85168276461ad212e43e8734a1b8ef77b6169e646e7344938e231c700d183aa768a92bae27ab568af6bb69fac8fc8cc9548b48eb39122645d2b2ce0a
-
Filesize
8KB
MD5280857f5d21344e3b640e998b0f9bf0a
SHA19506855e79a4adb9d6797230708076f53cb0602d
SHA2568993e810870b65e6b4cd206a63937fecf4c5aaa3d99abe69375e2cb31607a316
SHA5126cbb84e2480df89094771dd21452e08028c46b5cfddbe2a4b4823809b92ff77d1e68628c5a51a45351bb2ca15dad52fcc26d87ad3da2f2f25147cdb92d14d43d
-
Filesize
1KB
MD56fc32f641977ff44077b690a8acfd792
SHA11804ec8fd4e78f532dd98475b0c805d175acb311
SHA25674a7570425ad195f9c215056b2ef487fd1781a170b7affe875e75aaf9df8674d
SHA512184ec4b69c8ba0724ee6306b86fecfc2ed2b11534481ee2f1acf82b31c07471865c810a91e2fe9d96f4e4b08e2f7a4db6fdf274f94419ee3d1c8e1cc46c3e442
-
Filesize
1KB
MD5f9a7dc53238ce8baaf95c4a99fbd3492
SHA1853d28650730801dcd0cc6912fd609fcc50401d8
SHA25661caf516dafd68f66b066e775cdfe481496a5ba4ac2184771095e1789a6a9729
SHA51275d8a5136acf4ba3a62fc1bb9e6b30938931b46777b5c51bab4e572eb3cbd4bc86c32973ec5265b52d1dda42d6eafd9900fd6617c617e6f0a97b6b760ed5a9f2
-
Filesize
1KB
MD565d54ac9763f8265b9796798d70173f3
SHA1d79db526fe29d4af2d242e3bfcf1c89e5964faef
SHA256637847d6c7f5eada172d2ccb008e0aa167fceb0e589d637fd7ad835777a089a0
SHA512fbd4e0ea62897afe92b135ebccd0fda940a93aaa336a6a4348b7e3bc0de32e9bc48354d958935ef9be069f34068c0a3d20e7956a4a4f6c5b270bd2c2aa0ddd2a
-
Filesize
1KB
MD56ef35c3261f5d6c084045220ffbb50e5
SHA1bdecf0f4a1f282a436912ffab0853dd4c6a79b38
SHA256f230d4cd55004627c6a7560349853a33b159756b12cbcc244d7a0a90f2cc846d
SHA512aa7b9b05b329b66d1aa14b8e2fe7ad41e19fb8012ac4a2a0c49f550ec7257208121a743b658872c0efb7f3866cee02ca635827e309ba100bc8f4a496d7826cc3
-
Filesize
1KB
MD5e3b081c47b7278acdb5180a8ff40a506
SHA190ec465003d101f20af37bce9c4a5deb00ee0133
SHA25662cd678953bc914e466db850f740257babffbb6b0fa8b49952b5085f1e413fe2
SHA512872286d6c2f09c8c9a764ab2b278dc10be25fa0ba2cafbf35b5746dee73a952e6f5e14ffcd15b51de8809b2f27c63c3e1fef05500b861c7f468f75f3cb6ccb43
-
Filesize
338B
MD55ab540f543e5f91a498dca4907c32dc8
SHA14d70c0581091400f8e50777e2cf02635650bc485
SHA25697e257b514e41453368b5c852724fdf8ebff8faea182d39825d003e053961ef7
SHA512891c90b8a7c8ea1447bd431fd8d298e6774f08b48b3cda1309c7b592d0de36aa55ef6f30c2068f28c924fb792a7809256bdf24e9cc20371dbeb1d57843984ca8
-
Filesize
2KB
MD531377f7d6aaa167190e682dc708e68d0
SHA122d3b16197f9eaf7b6f38e151b27f964f313e53a
SHA2561be4f38772baea6248ce15fa3a49102082712aa673b2118deef435fd899de596
SHA512f2d9f6ec8d057dd3c50a5e4e9e3f522f0a253794da4083c95def972743e59dda43706608484d0430dac35f0e46ce45273bd4d00459cc9cb9f46696cec4a7ec4a
-
Filesize
2KB
MD5a39977d8835d73ff5784f2936817bf56
SHA1093e7d19ab034d5524b27c75719a9b12469a7d85
SHA256e546f1f99e9e2a9599ba4e0710d05bc8989837abd465afa29fc7de7e8c096f2e
SHA51299df63e8bb94fe00eab535ea03b8bf4214fdc125f341339869535619d84bc29a5d01c200defed32273a3dcfd9c0c392f53c5e70b3fe476dba1734c4235979c45
-
Filesize
1KB
MD5fcd775d919ff622248e0d4f3212b9e54
SHA174385272752dfd8610791c2d76deeaca3fbc1198
SHA2568b05dd0deefb8b384c77509f25c1f19da3b7aad52b244e0ab65da6cd25c052a4
SHA51279825183dac765f9d73abea4f0d9a86641385826751f763ee9642fa7429e0129490a9577d264e1c24ba9422a6cc20ab2c1256526e426d8d87cbacea68a02507f
-
Filesize
88KB
MD51e017ea55cb1a2997dec93468c08340a
SHA101e0e871b22659efa563ab9e748c3b7f6d2168cf
SHA2566a2353d3239661d1ce06b5eab33458eef5a12b47a0aee66f9b1b58d3de62e37b
SHA5126d21d08c04538d63833a0f30d0e4647363e1c7287c2721d3ad4eaf6101c5fa6d4b899cc4ee30da1d6ac48d87f23d190217f8ed07b554a486a697fc6cbafa6c8d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.3MB
MD584c6d2d33ed6f1aa356bca1d354448ab
SHA1e70b4058ed0389fb8482ee3cb2dc04334b6bb053
SHA256efe20d9f6b1427f69c61e3e128e576cf24a0b930903b1ff8fe7fdf3852d106c5
SHA51291e2fa7ae39523c5fb70d49ac3e33aacaa209827f95082b4c812b82c3a1733e1826f69b550d39c68b9ab6b0633bad9b02499bcd26971e971d7825af6eedf43fb
-
Filesize
1KB
MD5379a301592736712c9a60676c50cf19b
SHA1c103790503bf8c2ff3f119adee027ebb429b9d21
SHA256cc7400692bd90e1b5fc44e11c8dd7c788cbb462f52ea3f3decb579e4d51eb268
SHA512dec25a31f2930eb575a43e654c29f170c261c1c4516767c0e71cc172ad6ad115914fb58d9cd79f681ff3d7c6baa6b7c0d6de99de09d7582c9807ae436f15572f
-
Filesize
1KB
MD5d25e0f479b9601edf2c9c2dad7ba2706
SHA12f1d0001e47394f4c4deec9645c5f2df99f91a95
SHA25663ff360aafde5ff959fb9671ec27002f99cbfae4907b410046b6a1b0f51cba9e
SHA5123ba164dad3cadf1ea9f0c555695e4d39cba47612599f547d0d0d59014577995c0ddbff0ef6a5e436867454da02d500136b54c034c2223586271b26108b2cfb5e
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
7KB
MD54f8b110e37a818130310f0c34ec90dc5
SHA13bef6199fa0ba4c7b98d9c6a6c5a29c52ef9f3b1
SHA256db72101e43020be81ff304f50cf593497d66073be946502c16bcd64e7b2adcc3
SHA512d998b6f09e8750f8f99491e2c2dcbb0cec4a65f8154d795ca070eb131a4f88a30116715b67d1904a0b774e77d0b3ffdb994d10de5688e47f1e2901b10202402b
-
Filesize
3.0MB
MD5b55493d2b5f93a41c51811448ccd6975
SHA1584dc786acbb05e09062b98a7d976c9da17aa3a4
SHA2562cbba30b1ab1713a9320c18f9bb0c396f89fdba9ccb89f34dd9a12de2c81f405
SHA512e8f1aa0efa5c7fc3cfe6063c2600d70db1c7cb399b11f443c2575d054b531b856987ca19e9a4ba63161270046ac4dfe85e5675af0f49b722af0071629c0eb8d1
-
Filesize
1.2MB
MD5734e95cdbe04f53fe7c28eeaaaad7327
SHA1e49a4d750f83bc81d79f1c4c3f3648a817c7d3da
SHA2568c8fbcf80f0484b48a07bd20e512b103969992dbf81b6588832b08205e3a1b43
SHA51216b02001c35248f18095ba341b08523db327d7aa93a55bcee95aebb22235a71eae21a5a8d19019b10cac3e7764a59d78cf730110bae80acc2ff249bbc7861ad7
-
Filesize
3KB
MD56f8a551061cd35ef21630aa3a5a5e976
SHA171b30e652b7faafb53268fef20446a6680489847
SHA25619e9ab1c8c500ed390446dcd45fe9623218213e12b7ec78901dabe2a3adfecb2
SHA5125c0a3a15e7bd84b3ceb7ae4d5dd4e90a46f5c22fb86bfdf46975bbea08039fd2cb92f3ca9196126e8c9ad155e3129b3b7f7c755ed294c6a1c049bf9a1ea551f5
-
Filesize
71B
MD574d78bf90f0ec78cda820b12640fa479
SHA18d8556fa59127061b07c85887d118da99fe38c09
SHA256fd3a8f6849bae9b3ec3da603f5e1b513e31bfd596aaddc32a2acc013d2fd1992
SHA512dd12d6524c73e7208c15c15efd695de9158192cc41c764427be07a7ced8be0652f2069aa9dc219f40e986d337f49ef9734a28f41968164c466c5d4da704c6fe6
-
Filesize
10KB
MD597fb88b8e01556c5d5bab5ac2f5a4aa5
SHA1aa3ebcbfe2d98371382a7a23c4d9e16ac545ac6c
SHA256010fab4df10d461b9a262c816ed4729640b7c34828d6250d14b149569b67786b
SHA51285429247d84c7ffc83e587323c090ee58acb5e51565e841440634bffc9a6ab38e8f059c922f0e6722c756d363f4a36d73492be38277b198c386bd7119893a478
-
Filesize
131KB
MD59fc4051de7e30e35e843e5b049ea7a04
SHA180f16364e66263d9149131dee1fc4e99b96a01c0
SHA2561c7487c9fa44a15efc5c72fe962548e4304722b06cd80d12715eaa63d6ddb93a
SHA51231292039cda3c8ec09f71e856ae374f6dbace972cf6f8702f8c9f9c87c1e39a19ea6ca18455bc39c707b7c8894557368b56e61cb27abc9dd23bfb0cee84f2d17
-
Filesize
131KB
MD510125d66e95bb0e7d4c588e9155f92e9
SHA19b0a10a01e2ac40501c5bb250ad370543c30d5f2
SHA2567cd869e0b80dd2ffe478ff80afda41aca52ef133cca101c86ed0e8695d24e193
SHA512527f87097cced26a31440e42b5abcb56e8f019b116830796375ce1840ecdaf1ac03aa5f079179d1f053ff2a471cf6da00a37a5fb3c1985d7a35461336c530695